Beruflich Dokumente
Kultur Dokumente
Lexical Features
These features allow us to capture the property that malicious URLs tend to look different from benign URLs. For example, the appearance of the token .com in the URL www.ebay.com is not unusual. However, the appearance of .com in www.ebay.com.phishy.biz or phish.biz/www.ebay.com/ index.php could indicate an attempt by criminals to spoof the domain name of a legitimate commercial Web site. Similarly, we would like to capture the fact that there are certain red flag keywords that tend to appear in malicious URLs e.g., ebayisapi would appear frequently in the path of URLs attempting to spoof an eBay page.
Network features
We have only captured payload size i.e size of the webscript . Executable can be arbitrarily long, and obfuscated script may add to payload size as well.
We can Association rule mining for sales forecasting.Where forecasting will be done by By analyzing the most frequent items present in the dataset. We can also use time series analysis for forecasting .As we analyze the previous years sales patterns for analyzing.